AU2008307859A1 - Security method of keyboard input by directly controling the keyboard controler - Google Patents

Security method of keyboard input by directly controling the keyboard controler Download PDF

Info

Publication number
AU2008307859A1
AU2008307859A1 AU2008307859A AU2008307859A AU2008307859A1 AU 2008307859 A1 AU2008307859 A1 AU 2008307859A1 AU 2008307859 A AU2008307859 A AU 2008307859A AU 2008307859 A AU2008307859 A AU 2008307859A AU 2008307859 A1 AU2008307859 A1 AU 2008307859A1
Authority
AU
Australia
Prior art keywords
keyboard
input information
port
interrupt
security
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Abandoned
Application number
AU2008307859A
Inventor
Sung Jin Hwang
Hong Seok Kang
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Softcamp Co Ltd
Original Assignee
Softcamp Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Softcamp Co Ltd filed Critical Softcamp Co Ltd
Publication of AU2008307859A1 publication Critical patent/AU2008307859A1/en
Abandoned legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/01Input arrangements or combined input and output arrangements for interaction between user and computer
    • G06F3/02Input arrangements using manually operated switches, e.g. using keyboards or dials
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/82Protecting input, output or interconnection devices
    • G06F21/83Protecting input, output or interconnection devices input devices, e.g. keyboards, mice or controllers thereof

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • General Engineering & Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • Human Computer Interaction (AREA)
  • Input From Keyboards Or The Like (AREA)

Description

1 [DESCRIPTION] (Invention Title] SECURITY METHOD OF KEYBOARD INPUT BY DIRECTLY CONTROLING THE KEYBOARD CONTROLER [Technical Field] <1> The present invention relates generally to a method of securing keyboard input information which is capable of preventing information input via the keyboard from being exposed to unauthorized parties by directly controlling the interrupt of an 8042 keyboard controller in a PS/2 keyboard. [Background Art] <2> When a key of a keyboard is pressed in keyboard hardware (a key press event), an electric signal is generated and then transferred to an 8042 chipset disposed in a motherboard. Here, the keys of the keyboard are all disposed on a matrix in the form of an electric circuit. When a key is pressed, it can be found which key has been pressed by searching for row and column lines on which a change in electric current has occurred (refer to Fig. 1). <3> An 8042 keyboard controller for controlling the 8042 chipset records keyboard input information in the form of keyboard scan code in bi directional keyboard input/output (I/0) ports 60h and 64h which are used to transfer the keyboard input information to a CPU or to receive hardware control commands from the CPU, and generates an interrupt which is directed to the CPU (refer to Fig. 2). <4> The bi-directional keyboard I/0 ports include the ports 60h and 64h. The port 60h processes actual keyboard input information and hardware control commands, and the port 64h is used to issue status and commands with respect to the port 64h. <5> Table 1 shows the classification of the functions of the keyboard I/0 ports. <6> [Table 11 2 IN Buffer OUT Buffer 60h transmission of hardware transmission of keyboard input control command from 'CPU -> information from 'keyboard 1/0 keyboard 1/0 ports' ports -> CPU' 64h displayv of status of port 60h <7> The keyboard scan code includes Make Code that is generated at the moment a key is pressed and Break Code that is generated at the moment a key is released. If a key is pressed and held down, characters are consecutively output on a screen. That is, while a certain key is held down, Make Codes are consecutively output., At the moment the key is released, one Break Code is output, thereby terminating a key repeat process. <8> An interrupt refers to a method of, during a certain process, temporarily stopping the process and then calling the attention of the CPU in order to prompt the CPU to perform its task. The 8042 keyboard controller having received an electric signal that has been generated by the physical keyboard input requests the generation of an interrupt from an 8259 interrupt controller for controlling the 8259 chipset. The 8259 interrupt controller informs the CPU that the corresponding interrupt has been generated (an interrupt request), and the CPU, in order to call a corresponding interrupt handling function (an interrupt handler), reads an interrupt vector table that is loaded in memory and then obtains an address value (a memory address) corresponding to the generated interrupt. This address value indicates the value of an address at which a function (a so-called 'interrupt handling function' or 'interrupt handler') that is called when an interrupt is generated is stored. When a hardware device requests the CPU to process a specific operation or task, movement to the location of the address is made and then the interrupt handling function is executed. <9> As described above, the keyboard input information is transferred from a kernel area to the CPU and an application (a user area) that are controlled by an Operating System (OS), and are then output and processed as desired by a user. <10> Meanwhile, the input information may include information requiring 3 security such as personal information. Such input information is targeted for hacking for the purpose of being used criminally. In reality, input information has in fact been targeted for hacking and has been exposed to third parties without users' authorization. Therefore, there have been situations where a security system for protecting input information during the process of inputting that information through a keyboard has been urgently requested. <ii> In response to this request, various types of security systems have been provided so far. <12> A conventional keyboard security system performs different operations in the user area and the kernel area, respectively. In the kernel area, the conventional keyboard security system first fetches keyboard input information and performs security processing thereon. In contrast, in the user area, the conventional keyboard security system performs security processing on the keyboard input information fetched from the kernel area and finally outputs the resulting information. <13> Conventional security methods that are performed in the kernel area include a method of changing the Interrupt Descriptor Table (IDT) address of an interrupt function, or a method of enabling input information to be processed using a jump code, prior to being processed by an intrusion system. <14> However, since the conventional security method that operates in the kernel area is an OS-based method, the method of application must vary with the OS. Furthermore, in the case where the same security methods are used, there arises a problem in that the priorities for the processing of keyboard input information conflict with each other. Moreover, since an intrusion system that directly attacks a keyboard controller (hardware) cannot be deterred, there is a problem in that complete security for keyboard input information cannot be guaranteed. [Disclosure] [Technical Problem] <1s> Accordingly, the present invention has been made to solve the above 4 problems, and an object 9 f the present invention is to provide a method of securing keyboard input information by directly controlling a keyboard controller, which can, regardless of the type of and compatibility with an OS for supervising the general operations of a computer, independently secure and process information that is input through a keyboard, prior to being processed by intrusion systems, thereby providing enhanced security performance. [Technical Solution] <16> In order to accomplish the above object, the present invention provides a method of securing keyboard input information by directly controlling a keyboard controller of a keyboard, the keyboard including the keyboard controller for receiving the keyboard input information input by a user and writing the keyboard input information to keyboard I/0 ports, an interrupt controller for receiving an interrupt request from the keyboard controller and calling an interrupt handling function, an input information processing module for controlling the keyboard controller, and a keyboard security module for transferring the keyboard input information sent from the input information processing module to a central processing unit, the method including: <17> a status information checking step of enabling the input information processing module to check status information of the keyboard controller; <18> an interrupt inactivation step of inactivating an interrupt request function of the keyboard controller; <19> an input information encryption step of encrypting the keyboard input information written to the keyboard input/output ports; <20> a transfer step of transferring the encrypted input information to the keyboard security module; and <21> an input information deletion step of deleting the keyboard input information remaining in the keyboard controller. [Advantageous Effects] .22> According to the above-described present invention, input keyboard 5 input information can be encrypted and then separately processed through the manipulation of a PS/2 Xeyboard before the CPU pays attention thereto, so that there are advantages in that the present invention can be applied without the limitation of observing the processing procedure of an OS and in that strong security performance can be provided because security processing is performed first in the process of processing the keyboard input information. [Description of Drawings] <23> Fig. 1 is a diagram schematically showing a process of generating an electric signal in keyboard hardware; <24> Fig. 2 is a diagram schematically showing the operational principle of a PS/2-dedicated keyboard controller; <25> Fig. 3 is a block diagram showing the configuration of a system that forms a basis for performing a method of securing keyboard input information according to the present invention; <26> Fig. 4 is a flowchart sequentially showing the method of securing keyboard input information according to the present invention; <27> Fig. 5 shows a specification of control commands for an 8042 keyboard controller; and <28> Fig. 6 shows a specification of status information for the 8042 keyboard controller. [Mode for Invention] <29> Hereinafter, the present invention will be described in detail with reference to the attached exemplary drawings. <30> Fig. 3 is a block diagram showing the configuration of a system that forms a basis for performing a method of securing keyboard input information according to the present invention, and Fig. 4 is a flowchart sequentially showing the method of securing keyboard input information according to the present invention. With reference to these drawings, the following description will be given below. <31> The method of securing keyboard input information by directly 6 controlling a keyboard controller according to the present invention is configured to protect input information that has been input through a PS/2 keyboard and perform a security task independently of the influence of an OS. Accordingly, the method of securing keyboard input information according to the present invention, before the CPU recognizes the input information input through the PS/2 keyboard and performs an operation, transfers the input information to a keyboard security module according to the present invention, thereby enabling strong security to be achieved for the input information. <32> For this purpose, a security system according to the present invention includes an input information processing module for controlling the interrupt request function of an 8042 keyboard controller and checking and encrypting the keyboard input information, and a keyboard security module for performing the intermediation of .processing by transferring the encrypted input information to a user area. <33> The present invention is performed through the following steps. <34> S11: Step of checking status information of keyboard controller <35> The security system according to the present invention includes the input information processing module for controlling the 8259 interrupt controller that checks input information, that is, an electric signal that is received by the 8042 keyboard controller, and then generates an interrupt and checking and encrypting the input information, and a keyboard security module for performing the intermediation of processing by transferring the encrypted input information to a user area. <36> The input information processing module continuously checks status information by polling port 64h (checking it at regular intervals), and, in the case of a keyboard input, fetches corresponding keyboard input information by reading the port 60h. <37> The checking step S11 is used to change only a part corresponding to the corresponding keyboard input information, that is, a desired part, without changing existing status information. <38> The status information may be fetched by issuing a control command to 7 the port 64h. <39> The following description will be given with reference to Fig. 5 (a specification of control commands for the 8042 keyboard controller). When a control command 0x20 (read command byte) is written to the port 64h, current status information enters into the port 60h, and the input information processing module reads the port 60h and then fetches the current status information of the 8042 keyboard controller. <40> Fig. 6 shows a specification of status information for the 8042 keyboard controller. The input information processing module may identify the status information, shown in Fig. 6, at the port 60h. <41> S12: Step of inactivating interrupt of keyboard controller <42> As described above, when a user manipulates the keyboard, an electric signal is generated by the keyboard, and the 8042 keyboard controller (the 8042 chipset) receives the electric signal. <43> Meanwhile, the electric signal of the 8042 keyboard controller is transferred to keyboard input/output (I/0) ports in the form of a keyboard scan code, and the 8259 interrupt controller generates an interrupt in the keyboard 1/0 ports so as to process the keyboard scan code, so that the CPU can pay attention thereto. <44> Accordingly, the security method according to the present invention inactivates an interrupt request function so as to prevent the 8042 keyboard controller from requesting the 8259 interrupt controller to generate an interrupt. <45> The inactivating of the interrupt request function of the 8042 keyboard controller is accomplished by changing the status information, shown in Fig. 5 (the specification of status information for the 8042 keyboard controller), using a control command. <46> As can be seen from Fig. 6, since the interrupt information of the keyboard controller is INT, a keyboard interrupt is turned off when the value of INT is set to 0 as described below, thereby inactivating the interrupt request function of the 8042 keyboard controller.
8 <47> Q) A control command 0x60 (a write command byte) is written to the port 64h. <48> (2D INT is set to 0 and then written to the port 60h. <49> S13: Step of inputting information <50> A user inputs specific information by manipulating the PS/2 keyboard. That is, a user generates an electric signal through the manipulation of the keyboard hardware, and keyboard scan code-type input information corresponding to the electric signal is input to the keyboard I/0 ports through the 8042 keyboard controller, as described above. Meanwhile, due to the inactivation of the interrupt function of the 8042 keyboard controller, an interrupt is not generated, so that the CPU does not pay attention thereto. <51> S14: Step of determining whether input information is target for security (S15) <52> Whether the corresponding input information is a target for security is determined. <53> The types and amount of information that is input by a user through the manipulation of the keyboard are various and large. Accordingly, input information that is a target for security should be identified from the above-described input information. <54> As a simple example, in the case where keys capable of inputting text such as 'a', 'b' and 'c' are set as security targets and special keys such as 'Ctrl' and 'Alt' keys are set as non-security targets, when the key for 'a' that is a security target is pressed, input is encrypted and then transferred to a keyboard security module. In contrast, when the key 'Ctrl' that is not a target for security is pressed, input is not encrypted, but is subjected to the original keyboard input information processing procedure. <55> Since the criteria for determining whether information under consideration is the target for security may be modified and practiced in various manners, the security method according to the present invention is not limited to specific criteria, but the criteria may be modified and 9 practiced in various manners within a range that does not depart from the scope of the appended claims. <56> S16: Step of encrypting input information <57> If, as a result of the determination of whether the input information is the target for security, the corresponding input information is determined to be the target for security, the input information processing module encrypts the input information. <58> Since various encryption methods may be used, the method of encrypting the input information is not limited to a specific encryption method. <59> S17: Step of transferring encrypted information to keyboard security module <60> The encrypted input information is transferred to the keyboard security module using the function DeviceioControl. <61> S18: Step of deleting input information of keyboard controller <62> When the encrypted keyboard input information is transferred to the keyboard security module, the input information processing module deletes the keyboard input information existing in the 8042 keyboard controller. The deletion of the input information is performed by writing a control command Oxd2 (write keyboard buffer) to the port 64h and writing OxOO to the port 60h. <63> S19: Step of activating interrupt of keyboard controller <64> If the keyboard input information is determined not to be a target for security at step S14 (the step of determining whether the input information is the target for security), the interrupt request function is activated again in order for the processing of the corresponding input information to be subjected to the original keyboard input information processing procedure. <65> In order to activate the interrupt request function, the input information processing module writes a control command 0x60 (write command byte) to the port 64h, and writes the value of INT to the port 60h with INT set to 1. <66> S20: Step of inputting information 10 <67> In order to enable the original keyboard input information procedure to be normally performed, the input information processing module inputs keyboard input information to the keyboard controller again. <68> The input information processing module writes a control command OxOd2 (write keyboard buffer) to the port 64h and writes the keyboard input information to the port 64h, thereby inputting the keyboard input information again. <69> The keyboard input information which is input as described above and is not a target for security is transferred to the keyboard I/0 ports and then transferred to the CPU through a port driver, so that the CPU pays attention thereto due to the activated interrupt. <70> S21: Step of determining whether to continue applying security <71> Whether to continue applying security based on the security system according to the present invention is determined. If the application of security is determined to be continued, step S11 of checking the status information of the keyboard controller and step S12 of inactivating the interrupt of the keyboard controller are repeated. In contrast, if the application of security is determined not to be continued, the interrupt activated status is maintained. <72> The inactivation of the interrupt request function is achieved by writing the control command OxOO (write command byte) to the port 64h and writing the value of INT to the port 60h with INT set to 0, as described above. <73> Furthermore, the activation of the interrupt request function is achieved by writing the control command 0x60 (write command byte) to the port 64h and writing the value of INT to the port 60h with INT set to 1, as described above.

Claims (1)

  1. [CLAIMS] [Claim 1]
    A method of securing keyboard input information by directly controlling a keyboard controller of a keyboard, the keyboard including the keyboard controller for receiving the keyboard input information input by a user and writing the keyboard input information to keyboard input/output (I/O) ports, an interrupt controller for receiving an interrupt request from the keyboard controller and calling an interrupt handling function, an input information processing module for controlling the keyboard controller, and a keyboard security module for transferring the keyboard input information sent from the input information processing module to a central processing unit, the method comprising: a status information checking step of enabling the input information processing module to check status information of the keyboard controller; an interrupt inactivation step of inactivating an interrupt request function of the keyboard controller; an input information encryption step of encrypting the keyboard input information written to the keyboard input/output ports; a transfer step of transferring the encrypted input information to the keyboard security module; and an input information deletion step of deleting the keyboard input information remaining in the keyboard controller. [Claim 2]
    The method according to claim 1, further comprising, before the input information encryption step, a step of determining whether the keyboard input information written to the keyboard I/O ports is a target for security through the input information processing module, and, if the keyboard input information is determined to be a target for security, proceeding to the input information encryption step. [Claim 3]
    The method according to claim 2, further comprising: an interrupt activation step of, if the keyboard input information is determined not to be a target for security at the security target determination step, performing setting through the input information processing module so that the keyboard controller can request an interrupt; and an information input step for inputting the keyboard input information written in the keyboard I/O ports to the keyboard controller again. [Claim 4]
    The method according to any one of claims 1 to 3, wherein the input information deletion step is performed in such a way that the input information processing module writes a control command 0xd2 (write keyboard buffer) to port 64h and OxOO to port 6Oh. [Claim 5]
    The method according to any one of claims 1 to 3, wherein: the status information checking step is performed by inputting current status information to the port 6Oh of the keyboard 1/0 ports in such a way that the input information processing module writes a control command 0x20 (a read command byte) to the port 64h of the keyboard 1/0 ports, and by fetching the current status information of the keyboard controller in such a way that the input information processing module reads the port 6Oh; and the interrupt inactivation step is performed by writing a control command 0x60 (a write command byte) to the port 64h and a value of INT to the port 6Oh, with INT set to 0, through the input information processing module. [Claim 6]
    The method according to claim 3, wherein: the interrupt activation step is performed by writing a control command 0x60 (a write command byte) to the port 64h and INT to the port 6Oh, with INT set to 1, through the input information processing module; and the information input step is performed by writing a control command 0xd2 (write keyboard buffer) to the port 64h and the keyboard input information to the port 6Oh.
AU2008307859A 2007-10-02 2008-10-02 Security method of keyboard input by directly controling the keyboard controler Abandoned AU2008307859A1 (en)

Applications Claiming Priority (3)

Application Number Priority Date Filing Date Title
KR10-2007-0099234 2007-10-02
KR1020070099234A KR100909891B1 (en) 2007-10-02 2007-10-02 Encode processing method of the Keyboard input data for security in kernel
PCT/KR2008/005809 WO2009045059A2 (en) 2007-10-02 2008-10-02 Security method of keyboard input by directly controling the keyboard controler

Publications (1)

Publication Number Publication Date
AU2008307859A1 true AU2008307859A1 (en) 2009-04-09

Family

ID=40526836

Family Applications (1)

Application Number Title Priority Date Filing Date
AU2008307859A Abandoned AU2008307859A1 (en) 2007-10-02 2008-10-02 Security method of keyboard input by directly controling the keyboard controler

Country Status (6)

Country Link
US (1) US8340290B2 (en)
JP (1) JP5032663B2 (en)
KR (1) KR100909891B1 (en)
CN (1) CN101816005B (en)
AU (1) AU2008307859A1 (en)
WO (1) WO2009045059A2 (en)

Families Citing this family (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR101006721B1 (en) * 2009-01-20 2011-01-07 킹스정보통신(주) Keyboard input information security apparatus and method thereof
KR100952644B1 (en) * 2009-04-17 2010-04-13 주식회사 잉카인터넷 Security system and method of keyboard input data
KR20110015892A (en) * 2009-08-10 2011-02-17 주식회사 안철수연구소 Method and apparatus for security of bluetooth device, and computer readable media storing program for method therefor
US9477822B1 (en) * 2010-11-03 2016-10-25 Trend Micro Incorporated Secure password entry for accessing remote online services
US8707437B1 (en) * 2011-04-18 2014-04-22 Trend Micro Incorporated Techniques for detecting keyloggers in computer systems
US8954747B2 (en) * 2011-07-01 2015-02-10 Intel Corporation Protecting keystrokes received from a keyboard in a platform containing embedded controllers
US9471799B2 (en) 2014-09-22 2016-10-18 Advanced Micro Devices, Inc. Method for privileged mode based secure input mechanism
FR3026207B1 (en) * 2014-09-22 2018-08-17 Prove & Run SECURE DISPLAY TERMINAL
US10699033B2 (en) 2017-06-28 2020-06-30 Advanced Micro Devices, Inc. Secure enablement of platform features without user intervention
US10895597B2 (en) 2018-11-21 2021-01-19 Advanced Micro Devices, Inc. Secure coprocessor assisted hardware debugging
US11714891B1 (en) 2019-01-23 2023-08-01 Trend Micro Incorporated Frictionless authentication for logging on a computer service
CN110414225B (en) * 2019-07-24 2023-05-26 广东魅视科技股份有限公司 System and method for preventing HID keyboard attack

Family Cites Families (15)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5802318A (en) * 1995-07-25 1998-09-01 Compaq Computer Corporation Universal serial bus keyboard system
US6581162B1 (en) * 1996-12-31 2003-06-17 Compaq Information Technologies Group, L.P. Method for securely creating, storing and using encryption keys in a computer system
US6070204A (en) * 1998-01-06 2000-05-30 Intel Corporation Method and apparatus for using universal serial bus keyboard to control DOS operations
JP3227536B2 (en) * 1999-10-26 2001-11-12 ジェネティックウェア コーポレーション リミテッド Keyboard device and password authentication method using the same
US6912663B1 (en) * 1999-12-06 2005-06-28 International Business Machines Corporation Method and system for securing a personal computer bus
KR100378586B1 (en) * 2001-08-29 2003-04-03 테커스 (주) Anti Keylog method of ActiveX base and equipment thereof
KR20030036276A (en) * 2003-02-07 2003-05-09 킹스정보통신(주) Computer Security System using secure input device driver
US7243237B2 (en) 2003-05-02 2007-07-10 Microsoft Corporation Secure communication with a keyboard or related device
WO2005074397A2 (en) * 2004-02-05 2005-08-18 Kings Information & Network Computer security apparatus and method using security input device driver
KR100549645B1 (en) 2004-11-05 2006-02-06 소프트캠프(주) Guarding method for input data by keyboard and guarding system
KR100549646B1 (en) 2005-08-06 2006-02-06 소프트캠프(주) Intercepting method for the keyboard in-put information's flow without permission by altering interrupt handling function
KR100549647B1 (en) 2005-08-09 2006-02-06 소프트캠프(주) Keboard in-put information security method
WO2007061147A1 (en) * 2005-11-24 2007-05-31 Softcamp Co., Ltd. Guarding method for input data by usb keyboard and guarding system
CA2571450A1 (en) * 2005-12-21 2007-06-21 Nervo Security Encrypted keyboard
KR20070074897A (en) * 2006-01-11 2007-07-18 소프트캠프(주) System and method for security of input data on keyboard

Also Published As

Publication number Publication date
WO2009045059A2 (en) 2009-04-09
CN101816005B (en) 2013-11-06
WO2009045059A3 (en) 2009-05-22
JP5032663B2 (en) 2012-09-26
CN101816005A (en) 2010-08-25
JP2010541093A (en) 2010-12-24
US20100228994A1 (en) 2010-09-09
KR100909891B1 (en) 2009-07-31
KR20090034075A (en) 2009-04-07
US8340290B2 (en) 2012-12-25

Similar Documents

Publication Publication Date Title
US8340290B2 (en) Security method of keyboard input directly controlling the keyboard controller
JP5160722B2 (en) Active X-based keyboard hacking prevention input window
US7966466B2 (en) Memory domain based security control with data processing systems
JP2005509214A5 (en)
US8874931B2 (en) System and method for securing a user interface
KR101006721B1 (en) Keyboard input information security apparatus and method thereof
US11847225B2 (en) Blocking access to firmware by units of system on chip
JPH027640A (en) Apparatus for establishing high reliability transmission line between terminal console and high reliability imaginary terminal
US8082551B2 (en) System and method for sharing a trusted platform module
JPS63124151A (en) Logically safe processor system
WO2007140487A3 (en) Data access control systems and methods
US20050015611A1 (en) Trusted peripheral mechanism
US20080215852A1 (en) System and Device Architecture For Single-Chip Multi-Core Processor Having On-Board Display Aggregator and I/O Device Selector Control
US20120304264A1 (en) Key protecting method and a computing apparatus
US10754967B1 (en) Secure interrupt handling between security zones
KR102584506B1 (en) State information protection for virtual machines
JP2018519591A (en) Intermediate module for controlling communication between data processing devices and peripheral devices
JP4617581B2 (en) Data processing device
EP3274895B1 (en) System management mode trust establishment for os level drivers
EP3507736A1 (en) Method for avoiding a return oriented programming attempt on a computer and respective devices
JP2010044545A (en) Information equipment, program and password leakage prevention method
KR20090009649A (en) Method and system for securing usb keyboard input data

Legal Events

Date Code Title Description
MK1 Application lapsed section 142(2)(a) - no request for examination in relevant period